Firewall in Linux - Essay Example

Only on StudentShare

Extract of sample
Firewall in Linux

It is often referred to as a packet filter as it examines each packet transferred in every network connection to, from, and within your computer. iptables replaced ipchains in the 2.4 kernel and added many new features including connection tracking (also known as stateful packet filtering).1
This means that the configuration for the firewall is set to "deny all connections" by default and the only way to establish connections between to point or two entity, we have to explicitly add new rules for them.
The term "INPUT" refers to any packet that is coming to this computer, "OUTPUT" means any packet that is generated by this computer and is leaving it. The term "FORWARD" also means the packets that are arriving from another computer but their final destination is one other computer. In fact we have used this computer to transit the packets between two different computers. The term "DROP" means that "the packet is not allowed through the firewall and the sender of the packet is not notified."2
In our firewall rule set, as you have seen above in section one, all incoming and outgoing packets are dropped unless we add new rules that allow our system to deal with. We have only allowed the system to use one connection by defining only one connection named "eth0" in the rules as follows: ...Show more

Summary

In this paper, we will have a short introduction to firewall in Linux based systems. We will discuss the way we can use IP Tables to set firewall rules in Linux environment and we will aim to an IP Table firewall definition for a system that requires some special settings…
Author : mandyhowe
Save Your Time for More Important Things
Let us write a custom essay on your topic
"Firewall in Linux"
with a personal 20% discount.
Find out more

Related Essays

Heteregeneous Networks
This has brought about a wide range of options upon which more leverage in selecting solutions for organizations is based on. Even the most Microsoft Microsoft engineers a UNIX 3.5 interoperability toolkit with acronym SFU in 1999 to streamline, the integration between windows server 2003 family, windows XP professional and the windows 2000Family of operating systems and Unix/Linux systems in heterogeneous networks.
34 pages (8500 words) Coursework
Networking Assignment
The promiscuous mode of Ethernet card is vulnerability for the whole Unix system. This mode tells an Ethernet card that rather than only detecting and sending packets to the operating system, which were destined for itself, to send every packet it, sees to the operating system.
7 pages (1750 words) Essay
Firewall Architectures and Techniques A study on the high speed network security they provide.
The project is intended to describe and evaluate firewall architectures and techniques and network security they provide. The firewall is the central issue of the network security policy of the enterprise that defines procedures to protect the network and its contents and users from loss and damage.
2 pages (500 words) Essay
Vulnerabilities of Networks and Internet
The development in IT particularly in the prevention of attacks is continually developing to counter complex malicious and destructive activities. Technology, manufacturers and the government works hand in hand to fortify the network structure and further enhance network security management.
6 pages (1500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT